• Universal Serial Bus (USB) Hardware Implant COTTONMOUTH-I

    Old

    As we all know the NSA has many different tools that they use to spy on us. Today I will be writing about COTTONMOUTH-I, which is a USB hardware implant. What It Is COTTONMOUTH-I is a hardware implant which can be placed in USB devices. COTTONMOUTH-I is only one of the hardware implants from the […]

  • Apple iPhone Backdoor DROPOUTJEEP

    Old

    As we all know the NSA has many different tools that they use to spy on us. This covers everything from the TURMOIL, TURBINE, and QFIRE systems (as I covered in my NSA Surveillance post) to COTTONMOUTH-I which is a USB hardware implant (I will cover this in a later post). In this post I […]

  • The Importance of Strong Passwords

    Old

    This may seem like a very simple article to some of you out there but let me tell you in the “real world” this is a HUGE problem! Whenever you login to your email account, online banking account, or social media account you are always having to provide some sort of credentials to verify that […]

  • Denial of Service Attacks

    Old

    Where do I start with Denial-of-Service (DoS) attacks? I guess I will start with saying that DoS attacks are very common and can be as simple as someone holding down the F5 key on their keyboard or they can be as complicated as a Distributed Denial-of-Service (DDoS) attack with thousands of botnets hitting an entire […]

  • Cold Boot Attacks

    Old

    Some of you might have heard about an attack called a cold boot attack. This attack is a side channel attack that is performed by stealing the encryption keys out of a systems DRAM and/or SRAM that has an encrypted hard drive. How It Works A cold boot attacks are pretty simple to preform, but […]

  • Does TrueCrypt Have a Future?

    Old

    As some of you might have heard the 10 year old on-the-fly encryption (OTFE) software TrueCrypt was discontinued on May 28, 2014 by its anonymous developers. On May 28th of 2014 TrueCrypt’s website started forwarding visitors to sourceforge.net, which is a source code repository for free and open source software. Apparently the TrueCrypt developers discontinued […]

  • NSA Surveillance

    Old

    First of all let’s start off with what the NSA’s goal is; their goal is to have total surveillance and control in secrecy. The good news is they can’t… completely. There is no boundary on what the NSA wants to do but there are sometimes boundaries on what they are funded to do. What we […]

  • Surveillance in the Modern Age

    Old

    As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as […]

Back to Top